ForASec: Formal Analysis of Security Vulnerabilities in Sequential Circuits

11/05/2018
by   Faiq Khalid, et al.
0

Security vulnerability analysis of Integrated Circuits using conventional design-time validation and verification techniques is generally a computationally intensive task and incomplete by nature, under limited resources and time. To overcome this limitation, we propose a novel methodology based on model checking to formally analyze security vulnerabilities in sequential circuits considering side-channel parameters like propagation delay, switching and leakage power. In particular, we present a novel algorithm to efficiently partition the state-space into corresponding smaller state-spaces for faster security analysis of complex sequential circuits and thereby mitigating the associated state-space explosion due to their feedback loops. We analyze multiple ISCAS89 and trust-hub benchmarks to demonstrate the efficacy of our framework in identifying security vulnerabilities.

READ FULL TEXT
research
07/05/2023

Towards a Formal Verification of the Lightning Network with TLA+

Payment channel networks are an approach to improve the scalability of b...
research
11/03/2019

InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis

The recent Spectre attacks has demonstrated the fundamental insecurity o...
research
04/23/2021

Model Checking for Verification of Quantum Circuits

In this talk, we will describe a framework for assertion-based verificat...
research
01/18/2020

System-on-Chip Security Assertions

Assertions are widely used for functional validation as well as coverage...
research
03/14/2023

Half-Day Vulnerabilities: A study of the First Days of CVE Entries

The National Vulnerability Disclosure Database is an invaluable source o...
research
03/21/2021

EBF: A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols

Internet of Things (IoT) consists of a large number of smart devices con...
research
04/15/2019

ct-fuzz: Fuzzing for Timing Leaks

Testing-based methodologies like fuzzing are able to analyze complex sof...

Please sign up or login with your details

Forgot password? Click here to reset